Sciweavers

39 search results - page 4 / 8
» Improved on an improved remote user authentication scheme wi...
Sort
View
IJNSEC
2006
110views more  IJNSEC 2006»
13 years 5 months ago
The Improvement of YSYCT Scheme for Imbalanced Wireless Network
Recently, Yeh et al. proposed an improved password authenticated key exchange scheme (YSYCT scheme) which is secure against undetectable on-line password guessing attacks and prov...
Jung-Wen Lo
AMC
2005
218views more  AMC 2005»
13 years 5 months ago
Cryptanalysis of Lee-Hwang-Li's key authentication scheme
Abstract. Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosys...
Fangguo Zhang, Kwangjo Kim
INFORMATICALT
2008
168views more  INFORMATICALT 2008»
13 years 5 months ago
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards
With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Considering the limited compu...
Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu
SCN
2010
Springer
138views Communications» more  SCN 2010»
13 years 4 months ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov
VTC
2010
IEEE
167views Communications» more  VTC 2010»
13 years 4 months ago
An Efficient Authentication Scheme for Security and Privacy Preservation in V2I Communications
—In this paper, we propose a mutual authentication and key agreement scheme for V2I communications. Our scheme improves security and privacy protection compared with the existing...
Jung-Yoon Kim, Hyoung-Kee Choi, John A. Copeland